February 2010

Zabasearch the online people search

On Zabasearch.com you can search people online. H)

Companies such as PeopleFinders and US SEARCH are still charging for information. On Zabasearch you can find the information for free. So I find it quite interesting that I can use Zabasearch as an open information source.

Twitter enduring a Cyberwar?

TwitterBritain needs to learn from the actions of the Israeli military in the Gaza in using YouTube and tweets to engage in 21st-century cyber-warfare, the head of the Royal Air force said yesterday.

Air Chief Marshal Sir Stephen Dalton highlighted how the Israeli Air Force used the internet in the battle over international public opinion during last year's conflict as an example of harnessing new technology.

Rootkit attack Atapi.sys

Windows Blue Screen of Death could be a rootkit infection caused by the Tdss-rootkit which surfaced in the year 2008.

It appears that the affected machines had the rootkit infection by the deployment of Microsoft patches. Researchers isolated the atapi.sys file. They say that the atapi.sys is a good target for a rootkit attack because the atapi.sys loads early in the boot process. Once infected it is hard to replace the atapi.sys file. And the file is known to be able to "defend"itself.

Pre battle intelligence for Marjah

Before the battle started on the ground, RAF Tornados, flying high above the central Helmand Valley, began gathering intelligence by scanning the terrain below with targeting pods, searching for signs of insurgent activity.

The information was instantly relayed to mission headquarters in a secure bunker at Kandahar airbase, where analysts monitoring banks of computers began to sift through the intelligence and relay vital information back to troops on the front line.

Iran cyber war against the citizens

Iran’s clerical rulers, who succeeded in suppressing widespread demonstrations last week by blanketing Tehran with security, are escalating a cyber war to combat the increasingly powerful role of the internet in mobilizing their opponents.

Visitors to the website of the main challenger in last June’s disputed presidential election were greeted by an image of the Iranian flag and an AK-47 assault rifle. “Stop being agents for those who are safely in the US and are using you,” they were told.

The Liechtenstein case Germany set to buy Swiss tax evasion data

Swiss Interior Minister Didier Burkhalter criticized Germany for considering using stolen data to pursue tax evaders, but said his country was keen for stable relations with its larger neighbor.

Finance Minister Wolfgang Schaeuble said:"The decision has in principle been taken" to buy the data on some 1500 investors.

The cd contains details of hundreds of investors suspected of avoiding taxes via bank accounts in Switzerland.

Cyber Attack infiltrated Google & More

An operation labeled Aurora by the security experts has been setup to investigate the Google infiltration and more. This is about the cyber attack announced by Google.
Experts joined forces to investigate and analyze pieces of the code that were identified as the culprits in the attack.

Facebook and Twitter DDOS troubles

The latest social networking site Facebook experienced a denial of service attack. The popular social-networking site changed it stance.

Facebook encountered network issues related to an apparent DDOS attack. That resulted in a decrease of the service for some users. Facebook said: “No user data was at risk and we have restored full

access to the site for most users. We're continuing to monitor the situation to ensure that users have the fast and reliable experience they've come to expect from Facebook."

Cyber attack on Google inside job?

Google announced a while ago that they are going to stop censoring the Chinese version of its search engine. Google threatened to leave the Chinese market.

One of the main reason was the attack on google from Chinese hackers. Google claims that it was directly from China.

The attack

The attack, which used a bug in the Microsoft Internet Explorer and not to forget the trojan named Hydraq is considered sophisticated. Because the level of the technical expertise and the information the hackers had was high. They knew exactly who to attack, and where to attack it.

The Russian Business Network (commonly abbreviated as RBN) is a multi-faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale. It is the originator of MPack and an alleged operator of the Storm botnet.

Pages